TopVuln

High-risk vulnerability digests

CVE-2008-4390

  • HIGH

cret@cert.org

Details

CVSS v3
7.5
CVSS v2
10.0
NVD published
2008-12-09 00:30:00
EPSS
3.8% probability · 88.3th percentile — 2026-05-12
Affected versions
Cisco Linksys WVC54GC wireless video camera firmware before 1.25
Summary
This vulnerability affects widely deployed connected IoT security cameras. The device sends sensitive configuration data including administrator passwords in unencrypted cleartext when responding to remote management setup commands. Remote attackers can sniff network traffic to capture credentials and gain full administrative control over the camera.
Remediation
Upgrade the camera firmware to version 1.25 or later to fix the cleartext transmission issue. If firmware updates are no longer available, disable remote management functionality when it is not actively needed. Restrict access to the camera management interface to only trusted private local networks.
Exploit info
No public exploit found yet.

View on NVD

TopVuln sends digest emails with high-risk CVE picks across multiple authoritative sources—curated with EPSS and AI. Choose daily per-stream emails and optional weekly or monthly roundups.

Subscribe — free email digest or paid plan

Information is aggregated from multiple authoritative sources for convenience; verify with NVD and vendors before operational decisions.